Crypto and Security-lup-obsolete
21 – 30 of 69
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2012
-
Mark
On The Distribution of Linear Biases: Three Instructive Examples
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
2012) The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some instant- and practical-time related-key attacks on KTANTAN32/48/64
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Analysis of Malicious and Benign Android Applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On Hardware-Oriented Message Authentication
(
- Contribution to journal › Article
- 2011
-
Mark
Foveating instructional videos based on experts’ eye movements to teach perception and interpretation of dynamic scenes
2011) 16th European Conference on Eye Movements, ECEM, 2011 In Journal of Eye Movement Research 4(3). p.282-282(
- Contribution to journal › Published meeting abstract
-
Mark
Grain-128a: a new version of Grain-128 with optional authentication
(
- Contribution to journal › Article
-
Mark
A Technique for Remote Detection of Certain Virtual Machine Monitors
2011) The Third International Conference on Trusted Systems, INTRUST 2011 In Lecture Notes in Computer Science 7222. p.129-137(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
(
- Contribution to journal › Article